ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-79FBA5925A03
|
Infrastructure Scan
ADDRESS: 0x77a73bb808b9b9c8392b9b36cf50e7971d2d0835
DEPLOYED: 2026-04-29 01:37:59
LAST_TX: 2026-04-29 02:37:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Virtual memory mapped: 0x0000 -> 0xcdec. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Mocking MSG.SENDER as 0xbd69d4147d47d14db577a6b42eb69266238b7053. [TRACE] Bytecode segment 0x22 analysed. [VALID] Security status: DEEP_CORE scan finished. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x671cf64e5c94b8468e6d5dac53aae5b048134f97 0x30208bc5991b3ed1363fb64ff42f7d72cd55bb9a 0x49bfb6fdcde204f43c7e6dfa41e21a0139a45e07 0xebd035bcf458649bc6a5add696fda26c72ef6477 0x0fddf29ae35f1ff322800ca98fff4b50f4cd468f 0x77913191b1c86e809779b025c8f8fb6d46299266 0x907ee09f061990654219bbd5d90d6bd52a6b4bae 0x7b9cfa5a42fbddd7aca3ad4e494b71b27acec4e7 0x8ca7b5173a1eb9644fd09c0832c995a25fb63b10 0xf5c5640690a4357014d234171045558875fe7da2 0xf9826bee9de06016ad54f475aed5dd0951a07057 0x6fa9ef746c94ed9dd6b26290bff07def173d9640 0x8d9f5cb0ea938188b24c3b156eeab4f23dde1258 0x7f1f0d19d4a9b2307971e5d5ea7f80060cc7d9df 0xb95405cfe62facd095ce842e1cd55c074aaf6f9c 0xa192b76ea4692afe73839c4f891f1706343c1b8b 0xe2699b2d54fc28e5240d5dd2d93d584a060b9ec2 0x8d9a5de6348b22d7cc61c7d9e4f3a52ad42b8fe3 0xdda309b0b9e85b09375f1f741f399ce3476e8015 0x283aff5bd91f321505172507cf09e05285258526




